Decentralised Key Management for Delay Tolerant Networks

نویسنده

  • Christopher I. Djamaludin
چکیده

Advances in ubiquitous mobile computing has given rise to the pervasive deployment of physical devices embedded with sensors, software, and wireless communications that collect and exchange data. These devices are adept for deployment in environments with minimal existing infrastructure, as the devices themselves become the components of a functioning network. With the addition of mobility, these devices operate where disruption between entities is high, resulting in dynamic, fragmented, and ephemeral networks. Such networks are considered Delay Tolerant Networks (DTNs). The pervasiveness of DTN nodes, and their varied deployment environments leads to two important motivations for securing DTNs. First, the data collected, stored, and transferred between nodes can be of high value due to commercial, safety, or national security reasons. Second, persistent threats from adversaries are common. Consequently, the development of techniques to secure communications from persistent threats from within a DTN is an important area of research. One particular challenge that is foundational for securing DTN is public key management, in particular the provision of public key authentication. This is the ability for a node to verify the identity-public key binding of another node. The lack of public key authentication provides an adversary the capability of modifying the identity-public key bindings. This allows them to eavesdrop and modify contents of communications, as well as assume identities of others in the network for authentication purposes. As a result, the ability to verify the identity-public key binding is foundational to providing con dentiality, integrity, and message authentication that ensures security in a DTN. Public key authentication is achieved using Public Key Infrastructure (PKI). Centralised hierarchical PKI implementations rely on pre-established trust in a Certi cate Authority (CA), while decentralised implementations such as Pretty Good Privacy (PGP) rely on humans for trust establishment. These two methods of public key authentication

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated key exchange protocol evaluation in delay tolerant networks

Cryptographic key exchange is considered to be a challenging problem in Delay Tolerant Networks (DTNs) operating in deep space environments. The difficulties and challenges are attributed to the peculiarities and constraints of the harsh communication conditions DTNs typically operate in, rather than the actual features of the underlying key management cryptographic protocols and solutions. In ...

متن کامل

Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI

A Delay Tolerant Network (DTN) is one where nodes can be highly mobile, with long message delay times forming dynamic and fragmented networks. Traditional centralised network security is difficult to implement in such a network, therefore distributed security solutions are more desirable in DTN implementations. Establishing effective trust in distributed systems with no centralised Public Key I...

متن کامل

Delay-tolerant management using self-∗ properties and P2P technology

The introduction of self-* properties has been proven to be a feasible approach for the management demands of Delay-Tolerant Networks (DTNs). Among the properties of the self-* management vision, self-healing figures as a key property in improving the dependability of the managed infrastructures. An interesting possibility to materialize self-* support in delaytolerant management is through the...

متن کامل

Energy-Aware Probabilistic Epidemic Forwarding Method in Heterogeneous Delay Tolerant Networks

Due to the increasing use of wireless communications, infrastructure-less networks such as Delay Tolerant Networks (DTNs) should be highly considered. DTN is most suitable where there is an intermittent connection between communicating nodes such as wireless mobile ad hoc network nodes. In general, a message sending node in DTN copies the message and transmits it to nodes which it encounters. A...

متن کامل

Cryptographic Key Management in Delay Tolerant Networks: A Survey

Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016